add real examples about segmentations (#6897)

* Update src/data/roadmaps/cyber-security/content/perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md

---------

Co-authored-by: dsh <daniel.s.holdsworth@gmail.com>
pull/7078/head
sergiomarotco 2 months ago committed by GitHub
parent c9f34087c4
commit 537bbc2ceb
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
  1. 5
      src/data/roadmaps/cyber-security/content/perimiter-vs-dmz-vs-segmentation@PUgPgpKio4Npzs86qEXa7.md

@ -22,3 +22,8 @@ To implement a DMZ in your network, you can use devices such as firewalls, route
- Perimeter segmentation involves isolating an organization's internal networks from the untrusted external network, typically using security appliances such as firewalls, IDS, and IPS.
- DMZ segmentation involves creating a separate, secure area within the network for hosting public-facing services that need to be accessible to external users while maintaining additional security for internal assets.
- Implementing proper network segmentation and security policies can significantly reduce the risk of data breaches and other security threats.
Learn more from the following resources:
- [@opensource@Best practice for network segmentation](https://github.com/sergiomarotco/Network-segmentation-cheat-sheet)
- [@opensource@OWASP Network segmentation Cheat Sheet](https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Network_Segmentation_Cheat_Sheet.md#network-segmentation-cheat-sheet)
Loading…
Cancel
Save